Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Nov. 7, 2021, 5:17 p.m. | Nov. 7, 2021, 5:19 p.m. |
-
-
AdvancedRun.exe "C:\Users\test22\AppData\Local\Temp\b3d89b7a-e884-4aff-9e60-4d489ee2afdb\AdvancedRun.exe" /EXEFilename "C:\Users\test22\AppData\Local\Temp\b3d89b7a-e884-4aff-9e60-4d489ee2afdb\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
2872 -
AdvancedRun.exe "C:\Users\test22\AppData\Local\Temp\adbeaacd-7843-45aa-95a5-e6ac121e9fca\AdvancedRun.exe" /EXEFilename "C:\Users\test22\AppData\Local\Temp\adbeaacd-7843-45aa-95a5-e6ac121e9fca\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
2880 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\210.exe" -Force
2976 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\210.exe" -Force
3064 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\210.exe" -Force
1304 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\breakers.exe" -Force
2232 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\breakers.exe" -Force
2288 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\210.exe" -Force
2476 -
breakers.exe "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\breakers.exe"
2600-
AdvancedRun.exe "C:\Users\test22\AppData\Local\Temp\6332e2a5-bea0-4715-bca2-9fa2be51cd3d\AdvancedRun.exe" /EXEFilename "C:\Users\test22\AppData\Local\Temp\6332e2a5-bea0-4715-bca2-9fa2be51cd3d\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
788 -
AdvancedRun.exe "C:\Users\test22\AppData\Local\Temp\40c93470-5275-4068-a320-c58589917a36\AdvancedRun.exe" /EXEFilename "C:\Users\test22\AppData\Local\Temp\40c93470-5275-4068-a320-c58589917a36\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
2304 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\breakers.exe" -Force
3700 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\breakers.exe" -Force
3764 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\breakers.exe" -Force
3824 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\roughhouse\svchost.exe" -Force
3892 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\breakers.exe" -Force
3968 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\roughhouse\svchost.exe" -Force
1784 -
aspnet_regsql.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regsql.exe"
3304
-
-
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\roughhouse\svchost.exe" -Force
2740 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\210.exe" -Force
1668 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\roughhouse\svchost.exe" -Force
2460 -
jsc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
3376
-
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
109.107.191.37 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | D:\v2.0\A2\_work\59\obj\Release.AnyCPU\Vssf.Client\MS.VS.Services.Common\Microsoft.VisualStudio.Services.Common.pdb |
file | C:\Program Files (x86)\Google\Chrome\Application\chrome.exe |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local State |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Web Data |
name | RT_VERSION | language | LANG_ENGLISH | filetype | data | sublanguage | SUBLANG_ENGLISH_AUS | offset | 0x000f80f0 | size | 0x00000334 |
file | C:\Users\test22\AppData\Local\Temp\40c93470-5275-4068-a320-c58589917a36\AdvancedRun.exe |
file | C:\Users\test22\AppData\Local\Temp\adbeaacd-7843-45aa-95a5-e6ac121e9fca\AdvancedRun.exe |
file | C:\Users\test22\AppData\Local\Temp\b3d89b7a-e884-4aff-9e60-4d489ee2afdb\test.bat |
file | C:\Users\test22\AppData\Local\Temp\40c93470-5275-4068-a320-c58589917a36\test.bat |
file | C:\Users\test22\AppData\Local\Temp\6332e2a5-bea0-4715-bca2-9fa2be51cd3d\AdvancedRun.exe |
file | C:\Users\test22\AppData\Local\Temp\adbeaacd-7843-45aa-95a5-e6ac121e9fca\test.bat |
file | C:\Users\test22\AppData\Local\Temp\b3d89b7a-e884-4aff-9e60-4d489ee2afdb\AdvancedRun.exe |
file | C:\Users\test22\AppData\Local\Temp\6332e2a5-bea0-4715-bca2-9fa2be51cd3d\test.bat |
file | C:\Users\test22\AppData\Local\Temp\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\210.exe" -Force |
cmdline | C:\Windows\Microsoft.NET\Framework\v4.0.30319\SMSvcHost.exe |
cmdline | powershell Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\roughhouse\svchost.exe" -Force |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\roughhouse\svchost.exe" -Force |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\breakers.exe" -Force |
cmdline | powershell Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\210.exe" -Force |
cmdline | powershell Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\breakers.exe" -Force |
file | C:\Users\test22\AppData\Local\Temp\adbeaacd-7843-45aa-95a5-e6ac121e9fca\AdvancedRun.exe |
file | C:\Users\test22\AppData\Local\Temp\adbeaacd-7843-45aa-95a5-e6ac121e9fca\AdvancedRun.exe |
section | {u'size_of_data': u'0x000f4800', u'virtual_address': u'0x00002000', u'entropy': 6.919390100318595, u'name': u'.text', u'virtual_size': u'0x000f47e7'} | entropy | 6.91939010032 | description | A section with a high entropy has been found | |||||||||
entropy | 0.997450280469 | description | Overall entropy of this PE file is high |
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
cmdline | C:\Users\test22\AppData\Local\Temp\b3d89b7a-e884-4aff-9e60-4d489ee2afdb\AdvancedRun.exe /EXEFilename "C:\Users\test22\AppData\Local\Temp\b3d89b7a-e884-4aff-9e60-4d489ee2afdb\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run |
cmdline | C:\Users\test22\AppData\Local\Temp\adbeaacd-7843-45aa-95a5-e6ac121e9fca\AdvancedRun.exe /EXEFilename "C:\Users\test22\AppData\Local\Temp\adbeaacd-7843-45aa-95a5-e6ac121e9fca\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run |
cmdline | C:\Users\test22\AppData\Local\Temp\40c93470-5275-4068-a320-c58589917a36\AdvancedRun.exe /EXEFilename "C:\Users\test22\AppData\Local\Temp\40c93470-5275-4068-a320-c58589917a36\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run |
cmdline | "C:\Users\test22\AppData\Local\Temp\6332e2a5-bea0-4715-bca2-9fa2be51cd3d\AdvancedRun.exe" /EXEFilename "C:\Users\test22\AppData\Local\Temp\6332e2a5-bea0-4715-bca2-9fa2be51cd3d\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run |
cmdline | "C:\Users\test22\AppData\Local\Temp\adbeaacd-7843-45aa-95a5-e6ac121e9fca\AdvancedRun.exe" /EXEFilename "C:\Users\test22\AppData\Local\Temp\adbeaacd-7843-45aa-95a5-e6ac121e9fca\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run |
cmdline | "C:\Users\test22\AppData\Local\Temp\40c93470-5275-4068-a320-c58589917a36\AdvancedRun.exe" /EXEFilename "C:\Users\test22\AppData\Local\Temp\40c93470-5275-4068-a320-c58589917a36\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run |
cmdline | "C:\Users\test22\AppData\Local\Temp\b3d89b7a-e884-4aff-9e60-4d489ee2afdb\AdvancedRun.exe" /EXEFilename "C:\Users\test22\AppData\Local\Temp\b3d89b7a-e884-4aff-9e60-4d489ee2afdb\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run |
cmdline | C:\Users\test22\AppData\Local\Temp\6332e2a5-bea0-4715-bca2-9fa2be51cd3d\AdvancedRun.exe /EXEFilename "C:\Users\test22\AppData\Local\Temp\6332e2a5-bea0-4715-bca2-9fa2be51cd3d\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run |
cmdline | C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe |
host | 109.107.191.37 |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce\breakers | reg_value | C:\Program Files\Common Files\System\roughhouse\svchost.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce\breakers | reg_value | C:\Program Files\Common Files\System\roughhouse\svchost.exe |
file | C:\Users\test22\AppData\Local\Temp\6332e2a5-bea0-4715-bca2-9fa2be51cd3d\test.bat |
file | C:\Users\test22\AppData\Local\Temp\6332e2a5-bea0-4715-bca2-9fa2be51cd3d\AdvancedRun.exe |
file | C:\Users\test22\AppData\Roaming\FileZilla\sitemanager.xml |
file | C:\Users\test22\AppData\Roaming\FileZilla\recentservers.xml |